Differences between revisions 71 and 79 (spanning 8 versions)
Revision 71 as of 2006-05-24 13:40:47
Size: 22387
Editor: AlunEdwards
Comment:
Revision 79 as of 2006-05-24 14:32:01
Size: 23142
Editor: AlunEdwards
Comment:
Deletions are marked like this. Additions are marked like this.
Line 20: Line 20:
{{{
xxxx action for final report then please delete this note:: this has the 2 routes, “must use in report”. Large document with lots of use cases. Use this to bolster our set of use cases. ''N.B. Google for this as there may be different versions of this around the place.''
}}}
  * For project notes about this see UsecasesFoster
Line 42: Line 40:
  * For project notes about this see UsecasesHumanities
Line 44: Line 43:
  * For project notes about this see UsecasesGridshib
Line 46: Line 46:
  * For project notes about this see UsecasesAdvancedreservation
Line 50: Line 51:
  * For project notes about this see UsecaseseBusinessgrid
Line 90: Line 92:

 * Cockburn, Alistair, "Structuring Use Cases with Goals", Journal of Object-Oriented Programming, Sep-Oct, 1997 and Nov-Dec, 1997. Also available on http://alistair.cockburn.us/crystal/articles/sucwg/structuringucswithgoals.htm

 * Malan, R. and D. Bredemeyer, "Functional Requirements and Use Cases", June 1999. http://www.bredemeyer.com/pdf_files/functreq.pdf

 * Malan, R. and D. Bredemeyer, "Use Case Action Guide", April 2000. http://www.bredemeyer.com/pdf_files/UseCase_Template.PDF

 * Larmen, Craig, "Use-case model: writing requirements in context" from Applying UML and Patterns—An Intro to OOA/D and Iterative Development 2005 http://www.craiglarman.com/book_applying_2nd/06-use%20cases.pdf
Line 137: Line 147:
 * '''Use of SAML for OGSA Authorization'''. Von Welch, NCSA Rachana Ananthakrishnan, Argonne National Laboratory Frank Siebenlist, Argonne National Laboratory David Chadwick, University of Salford Sam Meder, University of Chicago Laura Pearlman, Information Sciences Institute. February 15, 2003.
http://www.cs.virginia.edu/~humphrey/ogsa-sec-wg/OGSA%20SAML%20Authorization%20Assertions-Feb15.pdf
 * '''Use of SAML for OGSA Authorization'''. Von Welch, NCSA Rachana Ananthakrishnan, Argonne National Laboratory Frank Siebenlist, Argonne National Laboratory David Chadwick, University of Salford Sam Meder, University of Chicago Laura Pearlman, Information Sciences Institute. February 15, 2003. http://www.cs.virginia.edu/~humphrey/ogsa-sec-wg/OGSA%20SAML%20Authorization%20Assertions-Feb15.pdf
Line 149: Line 158:
 * '''Security Implications of Typical Grid Computing Usage Scenarios'''. GFD-I.12 Security Working Grou, Marty Humphrey University of Virginia Mary Thompson Lawrence Berkeley National Laboratory October 2000 http://www.globalgridforum.org/documents/GFD/GFD-I.12.pdf  * '''Security Implications of Typical Grid Computing Usage Scenarios'''. GFD-I.12 Security Working Group, Marty Humphrey University of Virginia Mary Thompson Lawrence Berkeley National Laboratory October 2000 http://www.globalgridforum.org/documents/GFD/GFD-I.12.pdf
Line 154: Line 163:
  * For Project notes see UsecasesWelch
Line 166: Line 176:
 * [[Anchor(Beckles)]]'''Removing digital certificates from the end-user s experience of grid environments'''. Bruce Beckles University of Cambridge Computing Service. UK: Proceedings of the UK e-Science All Hands Meeting 2004. http://www.allhands.org.uk/2004/proceedings/papers/250.pdf  * [[Anchor(Beckles)]]'''Removing digital certificates from the end-users experience of grid environments'''. Bruce Beckles University of Cambridge Computing Service. UK: Proceedings of the UK e-Science All Hands Meeting 2004. http://www.allhands.org.uk/2004/proceedings/papers/250.pdf

xxxx Final edits needed on (and just off) this page

  • the pages of project notes in particular need to be "moth-balled" properly
    • AE will attend to this after Evaluation pages are signed off.
  • At least one action for Mark included – e.g. recording where n. MUST be in the report etc.

  • MN to add in VODefinition and PolicyManagementAndExchange references

Citations for all the articles used:


Security – grid use-cases


Security - definitions – e.g. what is a grid?


Security – grids